Results from FreePint Research into Authentication, Part 1 - Background and Methodology
Jinfo Article
20th August 2015
Abstract
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In the first section of results of FreePint's research results we look at the methodology, respondents... and at the factors which make authentication such a unique challenge.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Results from FreePint Research into Authentication, Part 1 - Background and Methodology
- Link to this page
- View printable version
- Results from FreePint Research into Authentication, Part 3 - What's Needed
Tuesday, 25th August 2015 - Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
Monday, 24th August 2015 - Grappling with Authentication and Access in the Pharma Field
Wednesday, 1st July 2015
- Exploring the Many Facets of Content Usage
Tuesday, 18th August 2015 - Managing Use of Web Content
Monday, 10th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015